INTERNATIONAL JOURNAL FOR RESEARCH ON
ELECTRONICS AND COMPUTER SCIENCE
                    ISSN 2321-5485 (Online) ISSN 2321-5784 (Print)

INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-3, ISSUE-3)

S.NO TITLE OF MANUSCRIPT ARTICLE ID DOWNLOAD
1. Analyzing Security and Performance Issue on Enterprise Data IJRECS/V-3/I-3/01
ManeendraYarru, Naga Mallik Accha
2. Identity Based Encryption Using Secure Brokerless Publisher Subscriber Model IJRECS/V-3/I-3/02
D. Saikumar, T. Venkat Narayana Rao
3. Comparison of Image Denoising Techniques in the Wavelet Domain IJRECS/V-3/I-3/03
Veesari Mounika, Ayesha Tarannum, D. Vijay Kumar
4. Proximity Malware Identification in IP- Based Wi-Fi Connections IJRECS/V-3/I-3/04
Aruna Peddi, M. Sreelatha
5. Access Control of Data Sharing in Cloud Computing by using Cryptosystems IJRECS/V-3/I-3/05
Kanneganti Priyanka, B. Tirupathi Kumar
6. Efficient and Multi-hop Cost-Effective Resource in the Overlay Routing Networks IJRECS/V-3/I-3/06
P. Nagendra, P. Srinivas
7. Efficient Multi-Keyword Ranked Search for Retrieving the Encrypted Cloud Data IJRECS/V-3/I-3/07
Ch. Aruna Reddy, K. Tulasi
8. Performance Analysis of Novel Encryption for Public Cloud Databases IJRECS/V-3/I-3/08
Mandru Praveen Raju, Thurimella Srikanth
9. Shortest Path Computing by using Effective Indexing and Query Optimization Mechanism IJRECS/V-3/I-3/09
Lakavath Anil Kumar, M. Swetha
10. Transient Steadiness of an Altered Rate Wind Farms to Weak Grid Connection Using UPQC IJRECS/V-3/I-3/10
Shaik Sarfaraj Ahammed, Boggavarapu Ramesh, Yerramsetty Pavani
11. Adaptability and Integrity Attestation System Security Frameworks for Software-As-A-Service IJRECS/V-3/I-3/11
P. Shivaranjani, R. Kavitha
12. Maintaining Secrecy Transmission of Data in Wireless Sensor Networks Using Elliptical Curve Cryptography IJRECS/V-3/I-3/12
Mallela Gopal, G. Uday Kumar
13. Implementation of Cloud Predicted Distributed Access Control with In-Nominate Authentication IJRECS/V-3/I-3/13
B. Vinayteja, K. Vinay Kumar Reddy
14. Detection of Denial of Service Attack in a System Using Multivariate Correlation Analysis IJRECS/V-3/I-3/14
M. Niharika, U. Sivaji
15. Automated API Property Inference Techniques IJRECS/V-3/I-3/15
Udaya Bhasker Sivakoti, Dr. R. China Appala Naidu
16. Altering Secrecy in Infrastructures of Content Based Publish/Subscribe IJRECS/V-3/I-3/16
P. Shirisha, K. C. Ravi Kumar
17. Finding Emerging Topics in Social Streams by means of Link-Anomaly Detection IJRECS/V-3/I-3/17
Mehjabeen Sultana, Sara Ali, Saleha Farha
18. Preventing Privacy Attribute-Based Signature in Cloud Computing IJRECS/V-3/I-3/18
G. Krishna Chaitanya, Ch. Srinath Reddy
19. ESMC Cloud: The Framework of Efficient Video Sharing and Adaptive Mobile Video Codec in the Clouds IJRECS/V-3/I-3/19
K. Bramham, K. Prathibha
20. Optimal Distributed Malware Selection for Heterogeneous Mobile Ad-Hoc Dissemination IJRECS/V-3/I-3/20
Ganuga Mahaboob Basha, Narra Sukhender Reddy
21. Evaluating Cost and Performance Metrics of Adaptive Encryption Architecture for Cloud Databases IJRECS/V-3/I-3/21
Sushma Dachavaram, M. Sreelatha, Tirupathi Durgam
22. Decentralized Disruption Tolerant Military Networks Using Attribute Based Secure Data Access Scheme IJRECS/V-3/I-3/22
Palsa Muthyalu, Dr. S. Krishna Mohan Rao
23. Efficient Method for Finding a Friend in Social Networks and Filtering of Unwanted Messages in User Wall IJRECS/V-3/I-3/23
Kumbham Venu, S. Sudha Rani